[go: up one dir, main page]

WO2014031304A3 - Technique for reconfigurable data storage media encryption - Google Patents

Technique for reconfigurable data storage media encryption Download PDF

Info

Publication number
WO2014031304A3
WO2014031304A3 PCT/US2013/053245 US2013053245W WO2014031304A3 WO 2014031304 A3 WO2014031304 A3 WO 2014031304A3 US 2013053245 W US2013053245 W US 2013053245W WO 2014031304 A3 WO2014031304 A3 WO 2014031304A3
Authority
WO
WIPO (PCT)
Prior art keywords
encryption key
technique
data storage
storage media
media encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/US2013/053245
Other languages
French (fr)
Other versions
WO2014031304A2 (en
Inventor
Geoffrey NESNOW
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Iron Mountain Inc
Original Assignee
Iron Mountain Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Iron Mountain Inc filed Critical Iron Mountain Inc
Publication of WO2014031304A2 publication Critical patent/WO2014031304A2/en
Publication of WO2014031304A3 publication Critical patent/WO2014031304A3/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6272Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database by registering files or documents with a third party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • H04L9/0897Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

A technique for managing encryption keys includes encrypting the contents of a piece of media with a first encryption key, encrypting the first encryption key with a second encryption key, and storing the encrypted first encryption key on or in connection with the piece of media. Encrypted data may be recovered by receiving the encrypted first encryption key from the piece of media, receiving the second encryption key (e.g., from a user to whom the key is assigned), recovering the first encryption key using the second encryption key, and decrypting the data from the piece of media using the first encryption key.
PCT/US2013/053245 2012-08-24 2013-08-01 Technique for reconfigurable data storage media encryption Ceased WO2014031304A2 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US201261692915P 2012-08-24 2012-08-24
US61/692,915 2012-08-24
US13/917,997 2013-06-14
US13/917,997 US20140059356A1 (en) 2012-08-24 2013-06-14 Technique for reconfigurable data storage media encryption

Publications (2)

Publication Number Publication Date
WO2014031304A2 WO2014031304A2 (en) 2014-02-27
WO2014031304A3 true WO2014031304A3 (en) 2014-04-17

Family

ID=50149109

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2013/053245 Ceased WO2014031304A2 (en) 2012-08-24 2013-08-01 Technique for reconfigurable data storage media encryption

Country Status (2)

Country Link
US (1) US20140059356A1 (en)
WO (1) WO2014031304A2 (en)

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9341281B2 (en) 2007-02-12 2016-05-17 Colt Irrigation Llc Fluid activated flow control apparatus
JP6112874B2 (en) * 2013-01-21 2017-04-12 キヤノン株式会社 COMMUNICATION DEVICE, COMMUNICATION DEVICE CONTROL METHOD, AND PROGRAM
US9594698B2 (en) * 2013-08-13 2017-03-14 Dell Products, Lp Local keying for self-encrypting drives (SED)
US10628406B1 (en) 2014-09-30 2020-04-21 EMC IP Holding Company LLC Method and system for secure data replication data integrity verification
GB2531770A (en) 2014-10-30 2016-05-04 Ibm Confidential Extracting System Internal Data
BR112017018890B1 (en) 2015-03-03 2023-11-28 Wonderhealth Llc ACCESS CONTROL FOR DATA ENCRYPTED IN MACHINE READABLE IDENTIFIERS
US10387577B2 (en) 2015-03-03 2019-08-20 WonderHealth, LLC Secure data translation using machine-readable identifiers
US9893885B1 (en) 2015-03-13 2018-02-13 Amazon Technologies, Inc. Updating cryptographic key pair
US9674162B1 (en) 2015-03-13 2017-06-06 Amazon Technologies, Inc. Updating encrypted cryptographic key pair
US10003467B1 (en) 2015-03-30 2018-06-19 Amazon Technologies, Inc. Controlling digital certificate use
US9479340B1 (en) 2015-03-30 2016-10-25 Amazon Technologies, Inc. Controlling use of encryption keys
JP6540403B2 (en) * 2015-09-10 2019-07-10 富士通株式会社 PORTABLE TERMINAL DEVICE, CONTROL PROGRAM, AND CONTROL METHOD
FR3045188B1 (en) * 2015-12-14 2017-12-22 Sagemcom Broadband Sas METHOD OF SECURING A MULTIMEDIA CONTENT RECORDING IN A STORAGE MEDIUM
US12519754B2 (en) 2019-09-24 2026-01-06 Pribit Technology, Inc. System for controlling network access of node on basis of tunnel and data flow, and method therefor
US12348494B2 (en) * 2019-09-24 2025-07-01 Pribit Technology, Inc. Network access control system and method therefor
US12381890B2 (en) 2019-09-24 2025-08-05 Pribit Technology, Inc. System and method for secure network access of terminal
US12267304B2 (en) 2019-09-24 2025-04-01 Pribit Technology, Inc. System for authenticating and controlling network access of terminal, and method therefor
CN114124389B (en) * 2021-11-09 2023-08-11 国网山东省电力公司电力科学研究院 Reconfigurable computing-based FPGA (field programmable Gate array) deployment method and system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005091547A2 (en) * 2004-03-18 2005-09-29 Digimarc Corporation Watermark payload encryption methods and systems
US20120102335A1 (en) * 2006-09-07 2012-04-26 International Business Machines Corporation Rekeying encryption keys for removable storage media

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080063198A1 (en) * 2006-09-07 2008-03-13 Jaquette Glen A Storing EEDKS to tape outside of user data area

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005091547A2 (en) * 2004-03-18 2005-09-29 Digimarc Corporation Watermark payload encryption methods and systems
US20120102335A1 (en) * 2006-09-07 2012-04-26 International Business Machines Corporation Rekeying encryption keys for removable storage media

Also Published As

Publication number Publication date
WO2014031304A2 (en) 2014-02-27
US20140059356A1 (en) 2014-02-27

Similar Documents

Publication Publication Date Title
WO2014031304A3 (en) Technique for reconfigurable data storage media encryption
WO2013068843A3 (en) Multi-key cryptography for encrypting file system acceleration
WO2011162990A3 (en) Single-use authentication methods for accessing encrypted data
WO2013022647A3 (en) System and method for wireless data protection
HK1212524A1 (en) Data security management system
AU2012225621A8 (en) Secure file sharing method and system
GB2489292B (en) Data transfer device
WO2015121806A3 (en) System and method for securing content keys delivered in manifest files
WO2008005789A3 (en) Secure escrow and recovery of media device content keys
WO2017034642A3 (en) Optimizable full-path encryption in a virtualization environment
WO2008121157A3 (en) Cryptographic key management system facilitating secure access of data portions to corresponding groups of users
EP2658164A3 (en) Cryptographic system, cryptographic communication method, encryption apparatus, key generation apparatus, decryption apparatus, content server, program, and storage medium
GB201304448D0 (en) Scrambling an address and encrypting write data for storing in a storage device
WO2013177297A3 (en) Encrypting and storing biometric information on a storage device
WO2016122747A3 (en) Storage for encrypted data with enhanced security
EP2506488A3 (en) Secure dynamic on-chip key programming
EP2433246A4 (en) Biometric identification method
WO2010127030A3 (en) Selectively securing data and/or erasing secure data caches responsive to security compromising conditions
WO2010039667A3 (en) External encryption and recovery management with hardware encrypted storage devices
WO2014059136A3 (en) Techniqued for secure data exchange
WO2007028099A3 (en) Efficient key hierarchy for delivery of multimedia content
WO2009042820A3 (en) Data security system with encryption
GB2509422A (en) Decryption and encryption of application data
WO2012172832A3 (en) Authenticator, authenticatee and authentication method
MX352100B (en) Securing a device and data within the device.

Legal Events

Date Code Title Description
122 Ep: pct application non-entry in european phase

Ref document number: 13830558

Country of ref document: EP

Kind code of ref document: A2